Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 22:07

General

  • Target

    61d85f958abe502b033355b9d16e941adc2dddbfbe5591a199c163414134bb87.exe

  • Size

    90KB

  • MD5

    835950fdd47d67a8c47d7f4894f15493

  • SHA1

    08e3034912a8a62e894eae0ff6b9bfcd155557ee

  • SHA256

    61d85f958abe502b033355b9d16e941adc2dddbfbe5591a199c163414134bb87

  • SHA512

    8a4ef969be1bfb5387678859f14ad2d14e11d35b0b50eb4e38acf4469e50397af3a9593a6d30c418425f488c03b25681b2d5981eff55ff8e6dba349311c88cf0

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuXsJtLJtL:enaym3AIuZAIuXY

Malware Config

Signatures

  • Renames multiple (3685) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61d85f958abe502b033355b9d16e941adc2dddbfbe5591a199c163414134bb87.exe
    "C:\Users\Admin\AppData\Local\Temp\61d85f958abe502b033355b9d16e941adc2dddbfbe5591a199c163414134bb87.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    905520bc9a1df7fbfeb626bdf0dcb841

    SHA1

    fa77f5bd055f70845862b18b05b0822f931d30fe

    SHA256

    67d51ed2d34a7b8e2582ad5b7fbe13886cbb4836c5db05f4d5ebf35a8d5a2c17

    SHA512

    ef869178ee8bc07d752a60e5515e84f6915b1db5ca9b0f5a6180cfa20cc517b137e6ad7dfddc6288578867da3aca0104c77138787f98443d06321e840f411a83

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    3999cc1866f3ebee2a5475a811e19e4a

    SHA1

    55b323ebb5130ca6e4dcfe83f021ba556f888b7d

    SHA256

    e1c34204f1f8d7f3713f9be9539b7d542c58daf6042dbdfa347f3c75601db236

    SHA512

    44aad088a87f2da37afacba111b1ad23ca6b49fbf413e5ec335b6446ff818a29c74fe026a922f62019494b0cc5afbbb38629ed2bd1e2ebc3844c5ae8c7bbd193

  • memory/1800-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1800-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB